Security....
Scot L. Harris
webid at cfl.rr.com
Wed Oct 27 19:57:37 UTC 2004
On Wed, 2004-10-27 at 15:25, Chris Hewitt wrote:
>
> Just wondering if I am missing something here. It may take a long time
> to go through _all_ combinations, but all the cracker wants is the
> _correct_ password. This might be on the first try, but not likely the
> last.
>
> Regards
>
> Chris
Correct. And as someone already pointed out, most human generated
passwords do not use the full set of characters available in a random
fashion. On top of that most passwords are dictionary based. So using
the right dictionary tool can greatly reduce the possible combinations
that you have to try. Of course if someone was seriously trying to
access a particular system social engineering would most likely work
quicker and easier. Plus a little research on the target can help
narrow the possibilities if you do have to perform a brute force attack.
--
Scot L. Harris
webid at cfl.rr.com
There are no answers, only cross-references.
-- Weiner
More information about the fedora-list
mailing list